Asian Journal of Information Technology

Year: 2019
Volume: 18
Issue: 4
Page No. 139 - 143

Highly Effective Security Techniques in OSN Based on Genetic Programming Approach

Authors : Y.N.S.R. Bharadwaj and K. Raja Sekhar

References

Adamic, L.A. and E. Adar, 2003. Friends and neighbors on the web. Social Netw., 25: 211-230.
Direct Link  |  

Aouragh, M. and A. Alexander, 2011. The Arab spring the Egyptian experience: Sense and nonsense of the internet revolution. Intl. J. Commun., 5: 1-15.
Direct Link  |  

Beato, F., M. Kohlweiss and K. Wouters, 2011. Scramble! Your Social Network Data. In: Privacy Enhancing Technologies, Fischer-Hubner S. and N. Hopper (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-22262-7, pp: 211-225.

Boase, J. and B. Wellman, 2006. Personal Relationships: On and off the Internet. In: The Cambridge Handbook of Personal Relationships, Vangelisti, A.L. and D. Perlman (Eds.). Cambridge University Press, Cambridge, UK., pp: 709-723.

Cristofaro, D.E., C. Soriente, G. Tsudik and A. Williams, 2012. Hummingbird: Privacy at the time of twitter. Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP), May 20-23, 2012, IEEE, San Francisco, California, ISBN:978-1-4673-1244-8, pp: 285-299.

Feng, N. and X. Yu, 2012. A data-driven assessment model for information systems security risk management. J. Comput., 7: 3103-3109.
Direct Link  |  

Gurses, S. and C. Diaz, 2013. Two tales of privacy in online social networks. IEEE. Secur. Privacy, 11: 29-37.
CrossRef  |  Direct Link  |  

Koorn, R., V.H. Gils, T.J. Hart, P. Overbeek and R. Tellegen et al., 2004. Privacy enhancing technologies, white paper for decision makers. Ministry of the Interior and Kingdom Relations, Netherlands, Europe.

Lee, M.C., 2014. Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. Intl. J. Comput. Sci. Inf. Technol., 6: 29-45.

Lipford, H.R., J. Watson, M. Whitney, K. Froiland and R.W. Reeder, 2010. Visual vs compact: A comparison of privacy policy interfaces. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 10-15, 2010, ACM, Atlanta, Georgia, USA., ISBN:978-1-60558-929-9, pp: 1111-1114.

McLuhan, M., 1964. Understanding Media: The Extensions of Man. 2nd Edn., Sphere Books, London, UK., Pages: 382.

Sayaf, R. and D. Clarke, 2012. Access Control Models for Online Social Networks. In: Social Network Engineering for Secure Web Data and Services, Caviglione, L., M. Coccoli and A. Merlo (Eds.). IGI Global, Dauphin County, Pennsylvania, ISBN-13:9781466639263, pp: 32-65.

Shehab, M., A. Squicciarini, G.J. Ahn and I. Kokkinou, 2012. Access control for online social networks third party applications. Comput. Secur., 31: 897-911.
Direct Link  |  

Stutzman, F. and W. Hartzog, 2012. Boundary regulation in social media. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, February 11-15, 2012, ACM, Seattle, Washington, USA., ISBN:978-1-4503-1086-4, pp: 769-778.

Tamjidyamcholo, A. and R.D. Al-Dabbagh, 2012. Genetic algorithm approach for risk reduction of information security. Intl. J. Cyber Secur. Digital Forensics., 1: 59-66.
Direct Link  |  

Wright, J., 2013. Necessary and inherent limits to Internet surveillance. Internet Policy Rev., Vol. 2, 10.14763/2013.3.184

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved